Solved

Active Directory Search Base

Posted on 2006-07-21
5
6,186 Views
Last Modified: 2012-05-05
Hey experts-
Quick question....I'm trying to figure out and understand my active directory. What is my cn=  on my Domain Controller? All of my users are under MyBusiness/Users/SBSUsers. Would it just be 'cn=SBSUsers'? or would it be something like 'cn=MyBusiness/Users/SBSUsers'

cn=?,dc=server,dc=com

My active directory looks like below
domain.com
           | Builtin
           | computers
           | domain controllers
           | ForeignSecurityPrincipals
           | MyBusiness
                         | Computers
                         | Distribution Groups
                         | Folders
                         | Groups
                         | Security Groups
                         | Users
                                  | SBSUsers
           | PastUsers
           | Resources
           | Users

Thanks in advance
0
Comment
Question by:NetAdmin2436
  • 3
  • 2
5 Comments
 
LVL 74

Accepted Solution

by:
Jeffrey Kane - TechSoEasy earned 125 total points
ID: 17159149
The users are:

CN=<User Name>,OU=SBSUsers,OU=Users,OU=MyBusiness,DC=<DomainName>,DC=local

Where <User Name> and <DomainName> should be substituted with your actual names.

Jeff
TechSoEasy
0
 
LVL 12

Author Comment

by:NetAdmin2436
ID: 17196632
Ok-
I actually have an X500 firewall that i'm trying to get to authenticate to my DC. So that's why i'm wondering what i should put in the search base on my X500 or any third party device/application.

cn=users,dc=server,dc=com is the example in the x500 manual, but i'm wondering if i need to specify the level of OU's. I think you may have answered it, but i haven't tried it yet. Early next week I should have some time and i'll give that a shot and put CN=SBSUsers,OU=Users,OU=MyBusiness,DC=<DomainName>,DC=local and see if that works for my firewall.

There's also a 'Group String:memberOf ' setting, but i think that is correct to leave at it is.  
0
 
LVL 74

Expert Comment

by:Jeffrey Kane - TechSoEasy
ID: 17196892
Are you using Fireware Pro with this?  

I've only set up one of these things, and I don't remember liking it too much... compared to just running ISA Server on the SBS box.

I'd post a pointer question over in http://www.experts-exchange.com/Networking/Microsoft_Network/ to have those guys give this a looksee.  
Howto post pointers: http://www.experts-exchange.com/help.jsp#hi262

Jeff
TechSoEasy
0
 
LVL 12

Author Comment

by:NetAdmin2436
ID: 17197086
Yeah, fireware pro v8.2. I'll try a few things next week, and point a question if i still can't figure it out.

Thanks for the help
0
 
LVL 12

Author Comment

by:NetAdmin2436
ID: 17203709
Cool, I think i got it. I found a good explanation document on watchguards website/forums. Yeah Basically your right without the <user name> since it does a group string search. CN=SBSUsers,OU=Users,OU=MyBusiness,DC=<DomainName>,DC=local

https://www.watchguard.com/support/Fireware_Howto/HowTo_FindADSearchBase.pdf 
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction At 19:33 (UST) on Tuesday 21st September the long awaited email arrived with the subject title of “ANNOUNCING THE AVAILABILITY OF WINDOWS SBS 7 PREVIEW”.  It was time to drop whatever I was doing and dedicate as much bandwidth as possi…
You may have discovered the 'Compatibility View Settings' workaround for making your SBS 2008 Remote Web Workplace 'connect to a computer' section stops 'working around' after a Windows 10 client upgrade.  That can be fixed so it 'works around' agai…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question